Prototype Sistem Deteksi Serangan Pada Server Samsat Menggunakan Intrusion Detection System (IDS) Berbasis Snort
DOI:
https://doi.org/10.30865/klik.v3i4.623Keywords:
Snort; Attack; System; Server; Syn-floodingAbstract
Problems from study This is Not yet exists system security server samsat to attack syn-flooding, so that is required Asystem Which can detect attack syn-flooding. On Method study use method survey and observation Where information collected from respondents through interview direct with manager office and manager server samsat. Results study This show that system based Snort Which designed for detect attack syn-flooding so thatcan detect attack syn-flooding the. From here can concluded that system This can Work with Good as steps early protection server for detect attack his flood on server Samsat
Downloads
References
T. Pangestu, R. Liza, P. Studi, T. Informatika, and U. H. Medan, “ISSN 2338-5677 Cetak ISSN 2548-6646 Online Analisis Keamanan Jaringan pada Jaringan Wireless dari Serangan Man In The Middle Attack DNS Spoofing ISSN 2338-5677 Cetak ISSN 2548-6646 Online,” vol. 10, no. 2, pp. 60–67, 2022.
A. W. Oki Kurniawan, Pribadi Widodo, “Eksperimen Perancangan Kemampuan Daya Serap Panel Akustik dari Sampah Kotak Karton Gelombang,” J. ITENAS Rekarupa, vol. 3, no. 1, pp. 1–8, 2016.
B. Wijaya and A. Pratama, “Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System (Ids) Berbasis Snort,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, pp. 97–101, 2020, doi: 10.32736/sisfokom.v9i1.770.
M. Mahmud and M. Hasnawi, “Implementasi Bot Telegram Untuk Monitoring Jaringan Dengan Pendekatan Security Policy Development Life Cycle Pada Kementerian Kelautan dan Perikanan Untia,” vol. 3, no. 2, pp. 127–133, 2022.
D. Kurnia, “PEMANFAATAN BETTERCAP SEBAGAI TEKNIK SNIFFING PADA PAKET TRAFIK JARINGAN WIFI,” pp. 83–85.
F. Nurohman, S. Ratnasari, R. Gunawan, F. Maulana, S. Nursuwars, and U. Siliwangi, “RANCANG BANGUN PROTOTYPE,” vol. 5, no. 2, pp. 106–114.
B. Santoso, A. Sobri, L. Sunardi, and B. Santoso, “KEPADA SATPOLPP KOTA LUBUKLINGGAU,” vol. 7, no. 1, pp. 68–78, 2022.
S. Pada and P. D. Devi, “PERENCANAAN SISTEM INFORMASI BERBASIS WEB UNTUK SISTEM PERSEDIAAN DAN SISTEM PEMESANAN PRODUK JADI KONVEKSI,” vol. 3, no. 2, pp. 2788–2794, 2016.
D. Wijayanti, N. Lestari, N. K. Daulay, D. Wijayanti, N. Lestari, and N. K. Daulay, “PROTOTYPE SISTEM MONITORING PARKIR PINTAR BERBASIS IOT ( IINTERNET OF THINGS ),” vol. 7, no. 2, pp. 123–131, 2022.
W. Fathoni, G. N. Nurkahfi, P. I. Komputasi, and F. Informatika, “DETEKSI PENYUSUPAN PADA JARINGAN KOMPUTER MENGGUNAKAN IDS,” vol. 3, no. 1, pp. 1169–1172, 2016.
F. Teknik, U. N. Surabaya, J. T. Informatika, F. Teknik, U. N. Surabaya, and A. Point, “MONITORING JARINGAN WIRELESS TERHADAP SERANGAN PACKET SNIFFING DENGAN MENGGUNAKAN IDS Achmad Rizal Fauzi I Made Suartana Abstrak.”
D. M. Informatika, F. Teknik, and U. N. Surabaya, “DETEKSI PAKET SNIFFING PADA WIRELLES MENGGUNAKAN ARP WATCH Aditya Ariyanto Asmunin Abstrak,” vol. 8, pp. 178–181, 2018.
M. Ulfa, “IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) DI JARINGAN UNIVERSITAS BINA DARMA,” no. 12, pp. 27–42, 2009.
A. Akhriana and A. Irmayana, “Web App Pendeteksi Jenis Serangan Jaringan Komputer dengan Memanfaatkan Snort Dan Log Honeypot,” vol. 12, no. 1, pp. 87–98, 1978.
U. M. Surakarta and B. A. Nugroho, “ANALISIS KEAMANAN JARINGAN PADA FASILITAS INTERNET ( WIFI ) TERHADAP SERANGAN PACKET SNIFFING,” 2012.
N. KURNIASIH, D. P. SARI, and D. A. RIZKA FIRDAUS, “Rancang Bangun Prototype Sistem Monitoring Pendeteksi Dini Banjir Berbasis Short Message Service Menggunakan PLTS On Grid,” Kilat, vol. 10, no. 1, pp. 77–88, 2021, doi: 10.33322/kilat.v10i1.1018.
O. I. Sanjaya, I. A. D. Giriantari, and I. N. S. Kumara, “Perancangan Sistem Pompa Irigasi Pembangkit Listrik Tenaga Surya ( PLTS ) Untuk Pertanian Subak Semaagung,” vol. 6, no. 3, pp. 114–121, 2019.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Prototype Sistem Deteksi Serangan Pada Server Samsat Menggunakan Intrusion Detection System (IDS) Berbasis Snort
ARTICLE HISTORY
Issue
Section
Copyright (c) 2023 Meli Pitriyanti, Nelly Khairani Daulay, Satrianansyah

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).